EP2622888B1 - Préservation de la confidentialité pour les dispositifs sans fil - Google Patents

Préservation de la confidentialité pour les dispositifs sans fil Download PDF

Info

Publication number
EP2622888B1
EP2622888B1 EP20110830038 EP11830038A EP2622888B1 EP 2622888 B1 EP2622888 B1 EP 2622888B1 EP 20110830038 EP20110830038 EP 20110830038 EP 11830038 A EP11830038 A EP 11830038A EP 2622888 B1 EP2622888 B1 EP 2622888B1
Authority
EP
European Patent Office
Prior art keywords
bssid
data packet
wireless
controller
wireless data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Not-in-force
Application number
EP20110830038
Other languages
German (de)
English (en)
Other versions
EP2622888A2 (fr
EP2622888A4 (fr
Inventor
Nimrod Diamant
David Gordon
Benjamin Getz
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Publication of EP2622888A2 publication Critical patent/EP2622888A2/fr
Publication of EP2622888A4 publication Critical patent/EP2622888A4/fr
Application granted granted Critical
Publication of EP2622888B1 publication Critical patent/EP2622888B1/fr
Not-in-force legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/73Access point logical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Definitions

  • This disclosure relates generally to the field of wireless communication, and in particular to privacy control for wireless devices.
  • Sensors such as location detecting sensors including GPS
  • GPS location detecting sensors
  • LANs local area networks
  • WLAN wireless local area networks
  • WiFi receive their IP address from the infrastructure around it.
  • a WiFi (WLAN) device acquires the identification number (basic service set identifier or BSSID) of access points it sees around it (or associates with) as part of its normal mode of operation.
  • the WiFi access point's BSSID is a unique identifier that can be used to find out the access point's location and thereof also the device's location, especially in mobile platforms.
  • Every WiFi adapter provides, upon a host software request, the BSSID of the associated access point and of other access points around it, as well as other data like signal strength, etc. Based on such data and sometimes using sophisticated triangulation calculation, these Internet servers will provide the client machine (or others) with a high accuracy estimation of the machine's location.
  • WiFi access point information is easily obtained by every software on the platform, and thus the user's privacy can be violated if software collects and sends such platform sensors' information to unauthorized or uncontrolled destinations. Also, in case such information is openly communicated over the network, it can be seen by others and used to determine and track the user's location.
  • software can access the WLAN driver using standard APIs and get information about the access points that the WLAN card sees.
  • SSIDS are translated by a network detector in descriptive and understandable text, symbols or names that can be displayed to the user.
  • Access Point Any entity that has a station (STA) functionality and provides access to the distribution services, via the wireless medium (WM) for associated STAs.
  • STA station
  • WM wireless medium
  • Basic service set The basic building block of an IEEE 802.11 wireless LAN (according to the IEEE 802.11-1999 standard).
  • a single access point (AP) together with all associated stations (STAs) is called a BSS.
  • STAs stations
  • Independent mode a set of synchronized STAs, one of which acts as master, forms a BSS.
  • Each BSS is identified by a BSSID.
  • the most basic BSS consists of one AP and one STA.
  • BSSID Basic Service Set Identifier
  • a Media Access Control is a data communication protocol sub-layer, also known as the Medium Access Control, is a sublayer of the Data Link Layer specified in the seven-layer OSI model (layer 2).
  • MS Mobile Station
  • STA Any device that contains an IEEE 802.11-conformant medium access control (MAC) and physical layer (PHY) interface to the wireless medium (WM).
  • MAC medium access control
  • PHY physical layer
  • STA Any device that contains an IEEE 802.11-conformant medium access control (MAC) and physical layer (PHY) interface to the wireless medium (WM).
  • MAC medium access control
  • PHY physical layer
  • Packet A basic unit for data transmission between stations.
  • Wireless medium The medium used to implement the transfer of protocol data units (PDUs) between peer physical layer (PHY) entities of a wireless local area network (LAN).
  • PDUs protocol data units
  • PHY peer physical layer
  • LAN wireless local area network
  • a computer-implemented method includes receiving, at a wireless adaptor of a device, a wireless data packet from an access point (AP), wherein the wireless data packet includes a Basic Service Set Identifier (BSSID) of the AP; changing the BSSID of the received data packet by a processor to produce a modified wireless data packet; and transmitting the modified wireless data packet to an application on the device.
  • AP access point
  • BSSID Basic Service Set Identifier
  • changing the BSSID can include encrypting the BSSID, scrambling the BSSID, or both.
  • the method can further include receiving a seed value or an encryption key from a controller to change the BSSID, wherein the controller is electrically coupled to the wireless adaptor.
  • the encryption key can include a public encryption key or a private encryption key and the controller can include a manageability engine.
  • the change of the BSSID can hide an actual BSSID from a software program, an operating system, or both of the device.
  • the change of the BSSID can allow a location derived from an actual BSSID to be hidden from a software program, an operating system, or both of the device.
  • the method can include transferring the received BSSID to an authenticated entity in a secured manner, wherein the received BSSID can be used to determine a location of the AP and provide a service related to location but preventing the application or an operating system of the device from assessing the received BSSID data and location data.
  • a computer-implemented method includes receiving, at a wireless adaptor of a device, a wireless data packet including a modified a Basic Service Set Identifier (BSSID) of an access point (AP); changing the modified BSSID of the received wireless data packet by a processor to produce a unmodified wireless data packet; and transmitting the wireless data packet to the AP.
  • BSSID Basic Service Set Identifier
  • the method can include changing the BSSID includes decrypting the BSSID, descrambling the BSSID, or both.
  • the method can include receiving a decryption key from a controller to change the BSSID, wherein the controller is electrically coupled to the wireless adaptor.
  • the decryption key can include a public decryption key or a private decryption key and the controller can include a manageability engine.
  • the method can further include receiving a seed value or a decryption key from a controller to initiate the unscrambling of the BSSID.
  • a device in accordance with some aspects of the present disclosure, includes a wireless adaptor including a processor in communication with a memory having instructions stored therein which, when executed: receive a wireless data packet from an access point (AP), wherein the wireless data packet includes a Basic Service Set Identifier (BSSID) of the AP; change the BSSID of the received data packet to produce a modified wireless data packet; and transmit the modified wireless data packet to an application on the device.
  • AP access point
  • BSSID Basic Service Set Identifier
  • the wireless adaptor can be configured to change the BSSID by encrypting the BSSID, scrambling the BSSID, or both.
  • the device can include a controller configured to provide an encryption key to the wireless adaptor for used in encrypting the BSSID, wherein the controller can include a manageability engine.
  • the wireless adaptor can be configured to separate information derived from an actual BSSID from a software program, an operating system, or both of the device.
  • SW Unauthorized software
  • APIs application programming interfaces
  • This SW or malware can reveal information to a malicious user that can later be used to track the computer as well as the location of the user. This access to the location without first getting consent from the user or being part of an application white list that are secure enough to be allowed to access this sensitive info can cause harm to the user.
  • a WiFi AP BSSID can be hidden from an operating system (OS) and general SW applications and be only transferred securely to authentic and approved applications and/or servers.
  • location revealing information can be hidden from OS/SW and passed securely to either some secure network server (which can give location based services) or to a secure OS service or application that can then track device location and provide this information only to authenticated apps or usages.
  • sensor data provided by various sensor devices either connected to or coupled with the user's computer can also be hidden or secured.
  • a standardized API and device driver interface (DDI) that works with the various sensors and their sensor data can be hidden or secured from OS/SW on the user's computer.
  • Sensors can come in many configurations including both hardware devices and software.
  • logical sensors can provide information through emulation of sensor functionality in software or firmware.
  • a single hardware device can contain multiple sensors.
  • the various sensors can include location sensors, such as GPS devices.
  • sensors can be software based, such as an IP resolver that provides location information based on an Internet address, a mobile phone tower triangulator, such as in a cellular network, that determines location based on nearby towers, or a Wi-Fi network location provider that reads location information from the connected wireless network hub.
  • IP resolver that provides location information based on an Internet address
  • mobile phone tower triangulator such as in a cellular network, that determines location based on nearby towers
  • Wi-Fi network location provider that reads location information from the connected wireless network hub.
  • actual (unscrambled) access points BSSID data can be altered so that software, whether intentionally or unintentionally loaded onto a user's device, can not determine the BSSID data.
  • a wireless adaptor such as a WLAN hardware or WLAN host driver, can alter, such as by scrambling or encrypting, the BSSIDs that is provided to software operating on the device. Once this scrambling algorithm is enabled, the software will receive a false (scrambled) BSSIDs picture so that in an attempt to send this data to web servers to resolve the device's location, an erroneous location or no location would result. With user control over that capability, location can be exposed to all applications or to no application or to limited/selected applications.
  • control over the wireless adapter can also be done securely by an out-of-band signal from a trusted platform entity or a hardware/software controller, i.e., but not limited to, a Manageability Engine (ME) or a WLAN OS driver.
  • a trusted platform entity i.e., but not limited to, a Manageability Engine (ME) or a WLAN OS driver.
  • ME Manageability Engine
  • user control can be performed at a BIOS level (pre OS) or through secured input/output of the ME, or through a trusted web site that can send user's instructions signed and encrypted to ME.
  • a trusted entity like the ME can access the WLAN BSSID information out-of-band (OOB) through a control bus, such as ME C-link control bus.
  • ME can provide to the WLAN controls for this capability (enable/disable) as well as per platform unique random scrambling/unscrambling key generation and/or storage for the BSSIDs translation from the real actual numbers to the scrambled numbers exposed to the device.
  • the WLAN card can implement a scrambling/unscrambling algorithm or use a real BSSID to scrambled BSSID translation or look-up table that pairs an actual BSSID with an equivalent scrambled BSSID.
  • the device When privacy mode is enabled, the device through, for example, a wireless adapter, can detect actual access points and replace the actual BSSID of the actual access points with a scrambled BSSID based on the scrambling algorithm. The scrambled BSSID, and not the actual BSSID, can then be exposed to the device's software. This process can be performed on a packet by packet basis. Similarly, when the device transmits a wireless data packet, the wireless adaptor can replace the scrambled BSSID that comes from the device driver with the actual, physical BSSID.
  • OOB out-of-band
  • control bus such as ME C-link
  • FIG 1 shows an example system in accordance with various aspects of the present disclosure.
  • Device 105 is shown communicating with device 110 through access point 115 over wireless medium 120.
  • Devices 105 and 110 have their own MAC address.
  • the MAC address of device 105 will be labeled "MAC address (C)
  • the MAC address of device 110 will be labeled "MAC address (A)”
  • access point 115 will have a BSSID ID labeled "BSSID (B).”
  • Devices 105 and 110 can be STAs or MS and can include computers such as a desktop, laptop, or smart phone.
  • Device 105 can include wireless adaptor 130 such as WiFi adapter having a MAC address.
  • Device 105 can also include BSSID scrambling algorithm 135 communicating with OS WLAN stack and applications 140 over bus 150, such as a PCI bus.
  • Transceiver 155 can be electrically coupled to and controlled by wireless adapter 130 and can communication with access point 115 and device 110 over wireless medium 120.
  • Access point 115 can communicate with device 110 through network 125, such as a LAN.
  • Transceiver 160 can be electrically coupled to and controlled by access point 115 and can communication with device 105 and/or device 110 over wireless medium 120 and with device 110 over network 125.
  • BSSID scrambling algorithm 135 can be arranged to mask, translate, scramble or encrypt BSSID of access point 115 using a variety of techniques, such as those techniques that would be appreciate by those of ordinary skill in the art.
  • the word “scramble” or “unscramble” will be general term for the various methods in which the BSSID can be altered as described herein.
  • the BSSID can be replaced with a similar, but unused or unrelated BSSID, such that the BSSID of access point 115 is not identical with the replacement BSSID.
  • the replacement BSSID can effectively mask or hide the actual BSSID from applications running on device 105.
  • the BSSID can also be scrambled using algorithms other than cryptographic algorithms.
  • a symmetric or asymmetric cryptographic algorithm may be used.
  • symmetric cryptographic algorithms that can be used include Advanced Encryption Standard (AES) and Data Encryption Standard (DES).
  • AES Advanced Encryption Standard
  • DES Data Encryption Standard
  • Other types of symmetric algorithms may also be used.
  • the types of asymmetric cryptographic algorithms that may be used include, but not limited to, public key encryption including RSA cryptography.
  • device 105 can also include a controller 170 (shown in dotted line) such as a Manageability Engine (ME) that is configured to communicate with BSSID scrambling algorithm 135 stored within a memory of wireless adaptor 130.
  • Controller 170 can provide a seed or encryption key and/or a look-up table for the WLAN BSSID translator.
  • Controller 170 can also communicate with applications 145 (shown in dotted line) over interface 150 (shown in dotted line), such as a host-to-embedded controller interface (HECI).
  • Applications 145 are configured to access the secured scrambled BSSID from controller 170 to be used by within device 105 or by another device in secured communication with device 105.
  • the scrambled BSSID can be made available by a user's consent.
  • Figure 2 shows an example data flow between device 110 and 105.
  • Device 110 assembles and transmits data packet 205 to access point 115 through network 125.
  • Data packet 205 includes a destination header information 210, for example "C” as shown in the figure, relating to a destination of the wireless packet, a source header information 215, for example "A” as shown in the figure, relating to a source of the wireless packet.
  • Headers 210 and 215 are assembled with the payload data 220, for example "payload” as shown in the figure, into data packet 205.
  • Access point 115 appends its BSSID 225 or "BSSID (B)" to data packet between headers 210 and 215.
  • Data packet 228 is transmitted over wireless medium 120 to device 105.
  • Transceiver 155 receives the transmitted data packet 228 and communicates data packet 228 to wireless adaptor 130.
  • Wireless adaptor 130 disassembles data packet 228 and converts the BSSID of access point 115 to a scrambled BSSID 235 of access point 115 using the scrambling algorithm.
  • Payload data of scrambled data packet can be communicated to OS WLAN stack and applications 140 over bus 150, such that the scrambled BSSID 235 and not the actual BSSID 225 is detectable by OS WLAN stack and applications 140.
  • controller 135 when controller 135 is used, controller 135 can provide, for example, a unique SEED or encryption key and/or a look-up table for WLAN BSSID translator. Applications 145 can then access from controller 135 a secured encrypted BSSID based upon a user's consent over interface 150.
  • OS WLAN stack and applications 140 communicates payload data 250, for example "payload" as shown in the figure, to wireless adaptor 130.
  • Wireless adaptor 130 receives payload data 250 and unscrambles the scrambled BSSID 255 using scrambling algorithm.
  • Unscrambled data packet 260 including unscrambled BSSID 265 is assembled at wireless adaptor 130 and transmitted by transceiver 155.
  • Transceiver 160 of access point 110 receives data packet 260.
  • Access point 110 transmits payload data 260 to device 115 over network 125.
  • various embodiments of this disclosure may be made in hardware, firmware, software, or any suitable combination thereof. Aspects of this disclosure may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors.
  • a machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device).
  • a machine-readable storage medium may include read only memory, random access memory, magnetic disk storage media, optical storage media, flash memory devices, and others.
  • firmware, software, routines, or instructions may be described herein in terms of specific exemplary embodiments that may perform certain actions. However, it will be apparent that such descriptions are merely for convenience and that such actions in fact result from computing devices, processors, controllers, or other devices executing the firmware, software, routines, or instructions.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Claims (15)

  1. Procédé mis en ouvre par ordinateur comprenant les étapes suivantes :
    recevoir, au niveau d'un adaptateur sans fil (130) d'un dispositif (105), un paquet de données sans fil (228) provenant d'un point d' accès (115), AP,
    où le paquet de données sans fil comprend un identifiant d'ensemble de services de base (225), BSSID, de l'AP (115) ;
    changer le BSSID du paquet de données reçu par un processeur de l'adaptateur sans fil (130) pour produire un paquet de données sans fil modifié (235) ; et
    transmettre, par le processeur, le paquet de données sans fil modifié à une application (140) sur le dispositif (105).
  2. Procédé selon la revendication 1, dans lequel changer le BSSID comprend de chiffrer le BSSID, de brouiller le BSSID, ou les deux.
  3. Procédé selon la revendication 1 ou la revendication 2, comprenant en outre de recevoir une valeur initiale ou une clé de chiffrement d'un contrôleur (135) pour changer le BSSID, où le contrôleur (135) est électriquement couplé à l' adaptateur sans fil (130).
  4. Procédé selon la revendication 3, dans lequel la clé de chiffrement comprend une clé de chiffrement publique ou une clé de chiffrement privée.
  5. Procédé selon la revendication 3, dans lequel le contrôleur (135) comprend un moteur de gérabilité.
  6. Procédé selon l'une quelconque des revendications 1 à 4, dans lequel le changement du BSSID cache un BSSID réel d'un programme logiciel, d'un système d'exploitation, ou des deux, du dispositif.
  7. Procédé selon l'une quelconque des revendications 1 à 4, dans lequel le changement du BSSID permet à un emplacement dérivé d'un BSSID réel d'être caché d'un programme logiciel, d'un système d'exploitation, ou des deux, du dispositif.
  8. Procédé selon l'une quelconque des revendications 1 à 4, comprenant en outre de transférer le BSSID reçu à une entité authentifiée de manière sécurisée, où le BSSID reçu peut être utilisé pour déterminer un emplacement de l'AP et pour fournir un service lié à un emplacement mais empêchant l'application ou un système d'exploitation du dispositif d'évaluer les données de BSSID et les données d'emplacement reçues.
  9. Procédé mis en ouvre sur un ordinateur comprenant les étapes suivantes :
    recevoir, au niveau d'un adaptateur sans fil (130) d'un dispositif (105), d'une application sur le dispositif (105), un paquet de données sans fil comprenant un identifiant d'ensemble de services de base (225), BSSID, modifié, d'un point d'accès (115), AP ;
    changer le BSSID modifié du paquet de données sans fil reçu en un BSSID original (265) de l'AP (115) par un processeur de l'adaptateur sans fil (130) pour produire un paquet de données sans fil non-modifié (260) ; et
    transmettre le paquet de données sans fil du processeur à l'AP (115).
  10. Procédé selon la revendication 9, dans lequel changer le BSSID comprend de déchiffrer le BSSID, de désembrouiller le BSSID, ou les deux.
  11. Procédé selon la revendication 9 ou la revendication 10, comprenant en outre de recevoir une clé de déchiffrement d'un contrôleur (135) pour changer le BSSID, où le contrôleur (135) est électriquement couplé à l'adaptateur sans fil (130) .
  12. Procédé selon la revendication 11, dans lequel la clé de déchiffrement comprend une clé de déchiffrement publique ou une clé de déchiffrement privée.
  13. Procédé selon la revendication 10, comprenant en outre de recevoir une valeur initiale ou une clé de déchiffrement d'un contrôleur (135) pour déclencher le désembrouillage du BSSID.
  14. Dispositif (105) comprenant :
    un adaptateur sans fil (130) comprenant un processeur en communication avec une mémoire ayant des instructions y étant stockées qui, lorsqu'elles sont exécutées par le processeur, amènent le processeur à :
    recevoir un paquet de données sans fil (228) d'un point d'accès (115), AP, où le paquet de données sans fil comprend un identifiant d'ensemble de services de base (225), BSSID, de l'AP (115) ;
    changer le BSSID du paquet de données reçu pour produire un paquet de données sans fil modifié (235) ; et
    transmettre le paquet de données sans fil modifié (235) à une application (140) sur le dispositif (105) .
  15. Dispositif (105) selon la revendication 14, comprenant en outre un contrôleur (135) électroniquement couplé à l'adaptateur sans fil (130) configuré pour fournir une clé de chiffrement à l'adaptateur sans fil (130) à utiliser pour chiffrer le BSSID, et/ou l'adaptateur sans fil (130) sépare des informations dérivées d'un BSSID réel d'un programme logiciel, d'un système d'exploitation, ou des deux, du dispositif.
EP20110830038 2010-09-30 2011-09-30 Préservation de la confidentialité pour les dispositifs sans fil Not-in-force EP2622888B1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/895,352 US8351354B2 (en) 2010-09-30 2010-09-30 Privacy control for wireless devices
PCT/US2011/054429 WO2012045043A2 (fr) 2010-09-30 2011-09-30 Préservation de la confidentialité pour les dispositifs sans fil

Publications (3)

Publication Number Publication Date
EP2622888A2 EP2622888A2 (fr) 2013-08-07
EP2622888A4 EP2622888A4 (fr) 2014-01-15
EP2622888B1 true EP2622888B1 (fr) 2015-05-20

Family

ID=45889859

Family Applications (1)

Application Number Title Priority Date Filing Date
EP20110830038 Not-in-force EP2622888B1 (fr) 2010-09-30 2011-09-30 Préservation de la confidentialité pour les dispositifs sans fil

Country Status (7)

Country Link
US (2) US8351354B2 (fr)
EP (1) EP2622888B1 (fr)
JP (1) JP5600214B2 (fr)
KR (1) KR101505846B1 (fr)
CN (1) CN103250440B (fr)
BR (1) BR112013007352A2 (fr)
WO (1) WO2012045043A2 (fr)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103517249B (zh) * 2012-06-29 2018-11-16 中兴通讯股份有限公司 一种策略控制的方法、装置和系统
US9232456B2 (en) * 2012-06-29 2016-01-05 Futurewei Technologies, Inc. Systems and methods for packet transmission with compressed address
DE202013006341U1 (de) * 2012-07-27 2013-08-08 Magine Holding AB System zur Wiedergabe eines Medieninhalts aus dem World Wide Web
US8955075B2 (en) * 2012-12-23 2015-02-10 Mcafee Inc Hardware-based device authentication
JP6056467B2 (ja) * 2012-12-27 2017-01-11 沖電気工業株式会社 無線端末および無線通信装置
CN104703175B (zh) * 2013-12-04 2021-10-19 苏州海博智能系统有限公司 移动终端的数据安全保护方法及设备
US9648577B1 (en) * 2014-02-12 2017-05-09 Wireless Registry, Inc. ADSS enabled global roaming system
CN104540134B (zh) * 2014-12-03 2018-07-06 北京奇安信科技有限公司 无线访问节点检测方法、无线网络检测系统和服务器
US10136349B2 (en) * 2016-06-20 2018-11-20 Futurewei Technologies, Inc. System and method for changing an identifier of a basic service set
TWI607398B (zh) * 2016-08-03 2017-12-01 中興保全股份有限公司 智慧型互動系統及其無線網路分享器
CN107786973B (zh) * 2017-10-30 2020-09-08 清华大学深圳研究生院 无线网络用户隐私保护方法和计算机可读存储介质
US11915606B2 (en) 2018-01-28 2024-02-27 Daniel Seth Lubiner Tactile and visual display with a paired, active stylus
CN110582082B (zh) * 2018-06-08 2022-06-10 阿里巴巴集团控股有限公司 一种待配网设备接入网络热点设备的方法和装置
US11412384B1 (en) 2019-10-03 2022-08-09 Rapid7, Inc. Incident detection and response using wireless access point data
GB2622804A (en) * 2022-09-28 2024-04-03 Nokia Technologies Oy Method, apparatus and computer program

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040106415A1 (en) * 2001-05-29 2004-06-03 Fujitsu Limited Position information management system
US7013391B2 (en) * 2001-08-15 2006-03-14 Samsung Electronics Co., Ltd. Apparatus and method for secure distribution of mobile station location information
US8539232B2 (en) * 2002-06-26 2013-09-17 Sony Corporation Information terminal apparatus, information processing apparatus and information communication system
US7698550B2 (en) * 2002-11-27 2010-04-13 Microsoft Corporation Native wi-fi architecture for 802.11 networks
KR100779800B1 (ko) * 2002-12-06 2007-11-27 엘지노텔 주식회사 무선 랜에서 인증 서비스 방법
US9137670B2 (en) * 2003-02-18 2015-09-15 Hewlett-Packard Development Company, L.P. Method for detecting rogue devices operating in wireless and wired computer network environments
KR100520931B1 (ko) * 2003-07-22 2005-10-17 삼성전자주식회사 무선 인프라스트럭쳐 네트워크 환경에서의 통신시스템 및그 통신방법
WO2005045642A2 (fr) * 2003-11-04 2005-05-19 Nexthop Technologies, Inc. Communications standards securises par reseau longue portee
US7330456B2 (en) 2003-12-19 2008-02-12 Mediatek, Inc. Method and apparatus for wireless relay within a network environment
US7359339B2 (en) * 2003-12-23 2008-04-15 Lenovo Singapore Pte Ltd Smart access point
US20050176420A1 (en) * 2004-02-05 2005-08-11 James Graves Wireless network detector
WO2006099296A2 (fr) * 2005-03-10 2006-09-21 Nexthop Technologies, Inc. Transmission de donnees et mobilite assurees de maniere souple et echelonnable sur reseaux sans fil securises
US7668140B2 (en) * 2005-05-11 2010-02-23 Alcatel-Lucent Usa Inc. Roaming between wireless access point
US7783756B2 (en) 2005-06-03 2010-08-24 Alcatel Lucent Protection for wireless devices against false access-point attacks
US20060280138A1 (en) * 2005-06-13 2006-12-14 Nvidia Corporation Wireless access point repeater
JP4892884B2 (ja) 2005-08-01 2012-03-07 日本電気株式会社 無線lan内蔵型携帯電話端末、携帯電話システムおよびその個人情報保護方法
US7339915B2 (en) * 2005-10-11 2008-03-04 Cisco Technology, Inc. Virtual LAN override in a multiple BSSID mode of operation
US9775093B2 (en) * 2005-10-12 2017-09-26 At&T Mobility Ii Llc Architecture that manages access between a mobile communications device and an IP network
US7948953B2 (en) * 2005-12-19 2011-05-24 Aruba Networks, Inc. System and method for advertising the same service set identifier for different basic service sets
JP4851798B2 (ja) * 2006-01-25 2012-01-11 Necインフロンティア株式会社 無線通信システム、無線lan基地局及びそれらに用いる設定内容確認/変更方法
WO2007116736A1 (fr) * 2006-03-30 2007-10-18 Nec Corporation Systeme et procede de gestion photographique, ainsi que dispositif et programme utilises pour ceux-ci
JP5012799B2 (ja) * 2006-07-04 2012-08-29 富士通株式会社 通信装置、通信装置による無線通信装置の接続先切替制御方法およびプログラム
JP4267026B2 (ja) * 2006-11-30 2009-05-27 Necインフロンティア株式会社 無線lan端末及びそのハンドオーバ方法
US7839856B2 (en) * 2007-06-06 2010-11-23 Cisco Technology, Inc. Centrally controlled routing with tagged packet forwarding in a wireless mesh network
US20090019539A1 (en) * 2007-07-11 2009-01-15 Airtight Networks, Inc. Method and system for wireless communications characterized by ieee 802.11w and related protocols
JP5074140B2 (ja) * 2007-09-28 2012-11-14 三洋電機株式会社 基地局装置および端末装置
WO2009041033A1 (fr) * 2007-09-28 2009-04-02 Sanyo Electric Co., Ltd. Système de communication, dispositif de station de base et dispositif de terminal
US8887307B2 (en) * 2007-10-12 2014-11-11 Broadcom Corporation Method and system for using location information acquired from GPS for secure authentication
JP2009284114A (ja) * 2008-05-21 2009-12-03 Nec Infrontia Corp 無線lan通信システム、アクセスポイント装置及びそれらに用いるネットワーク間移行方法
US8893295B2 (en) * 2010-12-21 2014-11-18 Intel Corporation Secure and private location

Also Published As

Publication number Publication date
KR101505846B1 (ko) 2015-03-25
US8351354B2 (en) 2013-01-08
US20130094489A1 (en) 2013-04-18
CN103250440A (zh) 2013-08-14
WO2012045043A2 (fr) 2012-04-05
CN103250440B (zh) 2016-06-01
JP5600214B2 (ja) 2014-10-01
US9143931B2 (en) 2015-09-22
KR20130054399A (ko) 2013-05-24
US20120082313A1 (en) 2012-04-05
JP2013543707A (ja) 2013-12-05
WO2012045043A3 (fr) 2012-06-28
BR112013007352A2 (pt) 2017-12-05
EP2622888A2 (fr) 2013-08-07
EP2622888A4 (fr) 2014-01-15

Similar Documents

Publication Publication Date Title
EP2622888B1 (fr) Préservation de la confidentialité pour les dispositifs sans fil
KR100991031B1 (ko) 소프트웨어 베이스 무선 인프라스트럭쳐 시스템, 디바이스 동작 방법, 무선 네트워크를 통해 통신하도록 적응된 디바이스, 및 컴퓨터 저장 매체
US9065908B2 (en) Method and system for ensuring user and/or device anonymity for location based services (LBS)
US8331567B2 (en) Methods and apparatuses for generating dynamic pairwise master keys using an image
US10701514B2 (en) Determining the distance between devices in a wireless data exchange protocol
US8769257B2 (en) Method and apparatus for extending transport layer security protocol for power-efficient wireless security processing
US20140337950A1 (en) Method and Apparatus for Secure Communications in a Wireless Network
US11863985B2 (en) Method and apparatus for detecting and handling evil twin access points
US20090088133A1 (en) Method and System for Distributing Data within a Group of Mobile Units
CN112291780A (zh) 用于无线站点的身份混淆
US11121871B2 (en) Secured key exchange for wireless local area network (WLAN) zero configuration
US20070076748A1 (en) Communication apparatus and communication control method
US20140082728A1 (en) Dongle device for wireless intrusion prevention
WO2017012204A1 (fr) Procédé de connexion sans fil, terminal, point d'accès sans fil, et support de stockage informatique
JP2010263310A (ja) 無線通信装置、無線通信監視システム、無線通信方法、及びプログラム
US11019037B2 (en) Security improvements in a wireless data exchange protocol
EP3720042B1 (fr) Procédé et dispositif permettant de déterminer un état de confiance d'un tpm et support de stockage
CN104335621B (zh) 关联标识通信装置和关联标识通信方法
CN106878989B (zh) 一种接入控制方法及装置
Williams The IEEE 802.11 b security problem. 1
KR101553827B1 (ko) 불법 ap 탐지 및 차단 시스템
KR20220155867A (ko) Uwb 보안 레인징을 수행하기 위한 방법 및 장치
CN117692902B (zh) 一种基于嵌入式家庭网关的智能家居的交互方法及系统
KR101343872B1 (ko) 비인가된 무선 AP(Access Point) 연결을 검출 및 제어하는 방법
CN117692902A (zh) 一种基于嵌入式家庭网关的智能家居的交互方法及系统

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20130417

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20131213

RIC1 Information provided on ipc code assigned before grant

Ipc: H04W 12/02 20090101AFI20131209BHEP

RIC1 Information provided on ipc code assigned before grant

Ipc: H04W 12/08 20090101ALI20141021BHEP

Ipc: H04W 48/16 20090101ALI20141021BHEP

Ipc: H04W 4/02 20090101ALI20141021BHEP

Ipc: H04W 12/02 20090101AFI20141021BHEP

Ipc: H04W 4/00 20090101ALI20141021BHEP

Ipc: H04W 8/26 20090101ALI20141021BHEP

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20141210

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: INTEL CORPORATION

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 728277

Country of ref document: AT

Kind code of ref document: T

Effective date: 20150615

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602011016674

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: T3

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 728277

Country of ref document: AT

Kind code of ref document: T

Effective date: 20150520

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150921

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150820

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150820

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150920

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150821

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602011016674

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: RO

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150520

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20160223

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: LU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20160531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150930

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150930

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150930

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20110930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150520

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20180918

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20180912

Year of fee payment: 8

Ref country code: GB

Payment date: 20180926

Year of fee payment: 8

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602011016674

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: MM

Effective date: 20191001

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20191001

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200401

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20190930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190930